Analysis
-
max time kernel
139s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 01:06
Behavioral task
behavioral1
Sample
4fd0c9d8fafa4d4f81d0d70ca966e7921c4736c4dfef9051af3fc1ccf20f3966.exe
Resource
win7-20230220-en
General
-
Target
4fd0c9d8fafa4d4f81d0d70ca966e7921c4736c4dfef9051af3fc1ccf20f3966.exe
-
Size
3.8MB
-
MD5
09e5c6db3ddafacd61fd8231a55b08ad
-
SHA1
a4444b5029718fcf540a92a8d7f7cf55dd462198
-
SHA256
4fd0c9d8fafa4d4f81d0d70ca966e7921c4736c4dfef9051af3fc1ccf20f3966
-
SHA512
44e673d66bc55fa547c8f14040299328af698de9782121f64ed86ecd1dc1c8ca85ae911deac60438b73c3d9be568ab7fe6244636d85895fe660e15b66fd0b727
-
SSDEEP
98304:3Vde8FivCeGDRsiSc/XBgZrzyWGgRSL6O2jSk6adBNWuz+VRD0MbQT:HZFwAur6XBazEgRSSjS5aT1z+/D0yQT
Malware Config
Extracted
raccoon
540b1db0b12b23e63e6942952aa03e47
http://45.9.74.36/
http://45.9.74.34/
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exeregid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exeregid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4fd0c9d8fafa4d4f81d0d70ca966e7921c4736c4dfef9051af3fc1ccf20f3966.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation 4fd0c9d8fafa4d4f81d0d70ca966e7921c4736c4dfef9051af3fc1ccf20f3966.exe -
Executes dropped EXE 4 IoCs
Processes:
Ooz9hTX7.exe74vJ6qcA.exeregid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exeregid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exepid process 4968 Ooz9hTX7.exe 3940 74vJ6qcA.exe 636 regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe 1248 regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe -
Loads dropped DLL 3 IoCs
Processes:
4fd0c9d8fafa4d4f81d0d70ca966e7921c4736c4dfef9051af3fc1ccf20f3966.exepid process 3236 4fd0c9d8fafa4d4f81d0d70ca966e7921c4736c4dfef9051af3fc1ccf20f3966.exe 3236 4fd0c9d8fafa4d4f81d0d70ca966e7921c4736c4dfef9051af3fc1ccf20f3966.exe 3236 4fd0c9d8fafa4d4f81d0d70ca966e7921c4736c4dfef9051af3fc1ccf20f3966.exe -
Modifies file permissions 1 TTPs 3 IoCs
Processes:
icacls.exeicacls.exeicacls.exepid process 3844 icacls.exe 3852 icacls.exe 3928 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe upx C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe upx C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe upx behavioral2/memory/636-222-0x00007FF76A250000-0x00007FF76A76F000-memory.dmp upx behavioral2/memory/636-223-0x00007FF76A250000-0x00007FF76A76F000-memory.dmp upx behavioral2/memory/636-225-0x00007FF76A250000-0x00007FF76A76F000-memory.dmp upx behavioral2/memory/636-226-0x00007FF76A250000-0x00007FF76A76F000-memory.dmp upx C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe upx behavioral2/memory/1248-228-0x00007FF76A250000-0x00007FF76A76F000-memory.dmp upx behavioral2/memory/1248-229-0x00007FF76A250000-0x00007FF76A76F000-memory.dmp upx behavioral2/memory/1248-230-0x00007FF76A250000-0x00007FF76A76F000-memory.dmp upx behavioral2/memory/1248-231-0x00007FF76A250000-0x00007FF76A76F000-memory.dmp upx behavioral2/memory/1248-232-0x00007FF76A250000-0x00007FF76A76F000-memory.dmp upx -
Processes:
resource yara_rule behavioral2/memory/3236-133-0x0000000000400000-0x000000000091F000-memory.dmp vmprotect -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exeregid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Ooz9hTX7.exedescription pid process target process PID 4968 set thread context of 320 4968 Ooz9hTX7.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4052 4968 WerFault.exe Ooz9hTX7.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
4fd0c9d8fafa4d4f81d0d70ca966e7921c4736c4dfef9051af3fc1ccf20f3966.exeOoz9hTX7.exe74vJ6qcA.execmd.exeAppLaunch.exedescription pid process target process PID 3236 wrote to memory of 4968 3236 4fd0c9d8fafa4d4f81d0d70ca966e7921c4736c4dfef9051af3fc1ccf20f3966.exe Ooz9hTX7.exe PID 3236 wrote to memory of 4968 3236 4fd0c9d8fafa4d4f81d0d70ca966e7921c4736c4dfef9051af3fc1ccf20f3966.exe Ooz9hTX7.exe PID 3236 wrote to memory of 4968 3236 4fd0c9d8fafa4d4f81d0d70ca966e7921c4736c4dfef9051af3fc1ccf20f3966.exe Ooz9hTX7.exe PID 4968 wrote to memory of 320 4968 Ooz9hTX7.exe AppLaunch.exe PID 4968 wrote to memory of 320 4968 Ooz9hTX7.exe AppLaunch.exe PID 4968 wrote to memory of 320 4968 Ooz9hTX7.exe AppLaunch.exe PID 4968 wrote to memory of 320 4968 Ooz9hTX7.exe AppLaunch.exe PID 4968 wrote to memory of 320 4968 Ooz9hTX7.exe AppLaunch.exe PID 3236 wrote to memory of 3940 3236 4fd0c9d8fafa4d4f81d0d70ca966e7921c4736c4dfef9051af3fc1ccf20f3966.exe 74vJ6qcA.exe PID 3236 wrote to memory of 3940 3236 4fd0c9d8fafa4d4f81d0d70ca966e7921c4736c4dfef9051af3fc1ccf20f3966.exe 74vJ6qcA.exe PID 3940 wrote to memory of 2628 3940 74vJ6qcA.exe cmd.exe PID 3940 wrote to memory of 2628 3940 74vJ6qcA.exe cmd.exe PID 2628 wrote to memory of 1864 2628 cmd.exe choice.exe PID 2628 wrote to memory of 1864 2628 cmd.exe choice.exe PID 320 wrote to memory of 3844 320 AppLaunch.exe icacls.exe PID 320 wrote to memory of 3844 320 AppLaunch.exe icacls.exe PID 320 wrote to memory of 3844 320 AppLaunch.exe icacls.exe PID 320 wrote to memory of 3852 320 AppLaunch.exe icacls.exe PID 320 wrote to memory of 3852 320 AppLaunch.exe icacls.exe PID 320 wrote to memory of 3852 320 AppLaunch.exe icacls.exe PID 320 wrote to memory of 3928 320 AppLaunch.exe icacls.exe PID 320 wrote to memory of 3928 320 AppLaunch.exe icacls.exe PID 320 wrote to memory of 3928 320 AppLaunch.exe icacls.exe PID 320 wrote to memory of 3384 320 AppLaunch.exe schtasks.exe PID 320 wrote to memory of 3384 320 AppLaunch.exe schtasks.exe PID 320 wrote to memory of 3384 320 AppLaunch.exe schtasks.exe PID 320 wrote to memory of 636 320 AppLaunch.exe regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe PID 320 wrote to memory of 636 320 AppLaunch.exe regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fd0c9d8fafa4d4f81d0d70ca966e7921c4736c4dfef9051af3fc1ccf20f3966.exe"C:\Users\Admin\AppData\Local\Temp\4fd0c9d8fafa4d4f81d0d70ca966e7921c4736c4dfef9051af3fc1ccf20f3966.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Ooz9hTX7.exe"C:\Users\Admin\AppData\Roaming\Ooz9hTX7.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"4⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"4⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1" /inheritance:e /deny "admin:(R,REA,RA,RD)"4⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "regid.1991-06.com.microsoftMicrosoft-type3.6.4.1\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1" /TR "C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe" /SC MINUTE4⤵
- Creates scheduled task(s)
-
C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe"C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 2803⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\74vJ6qcA.exe"C:\Users\Admin\AppData\Roaming\74vJ6qcA.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Roaming\74vJ6qcA.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 04⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4968 -ip 49681⤵
-
C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exeC:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exeFilesize
312.1MB
MD59abae28758c074bb926c69dc76cf77fb
SHA10ecfa6df66eb56dec1475e8e7a8e70507d6798db
SHA256b5cb5596f0904e61717f6724447762b2bc0ebd9645aad73cdf41e0fcd11ee80c
SHA512df3092c649f255d3a10197923c167b29d08a62feffb47c71c6551e18dd78bb6bcde82c96773d54b06d08c94f2c2a5d20da8582666135b9731732e93edbca614e
-
C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exeFilesize
319.1MB
MD57e39218faeea906dbd2c030f28fa0132
SHA16e9dff5d40f51f770a07f48711ba18d6a749492a
SHA256f772b2a7d6b90f4acd94402988bc0760b28771be2c6db2be9e89b2f5eed85d26
SHA512231cb28560ae840b9732d35ab0cf27784afd0c57c74d8733cda491bef2f17144939cff3b48485cea321b9daacd9d7e1ef634add3b6fdc5355106bc3592d5215d
-
C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exeFilesize
342.9MB
MD5985dc720a8bb5f91c6907cd36ba54337
SHA10bfcea424b6cb8bba8d189bb6b9c157d76b84339
SHA256958e522df8967e541ccf65d69e88477ee40387534061ec3c0aca8b7d5d585152
SHA512beb5f7718542c6328bf5b0a593bc5460e45d2dfba114a250773f7861852c091c8dd461bc7fc52ed5b9e23c48f6e924aeb9eb2cc2e40399c94be83ef53ff250b1
-
C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1\regid.1991-06.com.microsoftMicrosoft-type3.6.4.1.exeFilesize
254.5MB
MD5b8648c1e5f7925ee11319dd68dd04e0e
SHA16fc998bd55ab556d2b636c22c1abb38d9499268d
SHA25637ae6aefab5f7003d1531f56c6ecc0f91969f3b9547cd1fcf19519dd722e0ba3
SHA512ee70daf76b4470236fa97273d9e4e6af2d5e29351bd79ff03e7200230c6a446967189b14d3a4086af9db85517dd5211c91201f83ef318d883e31a49eef173503
-
C:\Users\Admin\AppData\LocalLow\mozglue.dllFilesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
C:\Users\Admin\AppData\LocalLow\nss3.dllFilesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
C:\Users\Admin\AppData\LocalLow\sqlite3.dllFilesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
C:\Users\Admin\AppData\Roaming\74vJ6qcA.exeFilesize
13.9MB
MD5809fd08e5f79d466a9246b7a793f691d
SHA13256eca2d1638d421bc53cbfcca50effc18b5cec
SHA256b532572f5b6417a242309c4a1bf5eef3eac6070626df9dd5b23c89d81592e2d8
SHA51293192b344bc02daa6b81e0ea8b009ffe8e193ec2561678620e0efde39b4a0b43b00db4c1bea5a1859318bb91d3d66fc806130cee139b7b2d6a7951401d329c53
-
C:\Users\Admin\AppData\Roaming\74vJ6qcA.exeFilesize
13.9MB
MD5809fd08e5f79d466a9246b7a793f691d
SHA13256eca2d1638d421bc53cbfcca50effc18b5cec
SHA256b532572f5b6417a242309c4a1bf5eef3eac6070626df9dd5b23c89d81592e2d8
SHA51293192b344bc02daa6b81e0ea8b009ffe8e193ec2561678620e0efde39b4a0b43b00db4c1bea5a1859318bb91d3d66fc806130cee139b7b2d6a7951401d329c53
-
C:\Users\Admin\AppData\Roaming\74vJ6qcA.exeFilesize
13.9MB
MD5809fd08e5f79d466a9246b7a793f691d
SHA13256eca2d1638d421bc53cbfcca50effc18b5cec
SHA256b532572f5b6417a242309c4a1bf5eef3eac6070626df9dd5b23c89d81592e2d8
SHA51293192b344bc02daa6b81e0ea8b009ffe8e193ec2561678620e0efde39b4a0b43b00db4c1bea5a1859318bb91d3d66fc806130cee139b7b2d6a7951401d329c53
-
C:\Users\Admin\AppData\Roaming\Ooz9hTX7.exeFilesize
3.4MB
MD503e57c419d5bf3221c69a098085f9ff2
SHA1a7d708e9f356be139f90c2db787939e9a5eb4f2e
SHA256f14ff29c31fb7f6a27e75f925000475fd103a924466a55426e1ea314870df500
SHA5128c8fab2114e5d05d3d5c85558e4e7480fb93e210bc1dadc001131c2292034083f7920721396ffeedba65cdb0dcde0faee2b36f05e2e46b06749564dd5c398a83
-
C:\Users\Admin\AppData\Roaming\Ooz9hTX7.exeFilesize
3.4MB
MD503e57c419d5bf3221c69a098085f9ff2
SHA1a7d708e9f356be139f90c2db787939e9a5eb4f2e
SHA256f14ff29c31fb7f6a27e75f925000475fd103a924466a55426e1ea314870df500
SHA5128c8fab2114e5d05d3d5c85558e4e7480fb93e210bc1dadc001131c2292034083f7920721396ffeedba65cdb0dcde0faee2b36f05e2e46b06749564dd5c398a83
-
C:\Users\Admin\AppData\Roaming\Ooz9hTX7.exeFilesize
3.4MB
MD503e57c419d5bf3221c69a098085f9ff2
SHA1a7d708e9f356be139f90c2db787939e9a5eb4f2e
SHA256f14ff29c31fb7f6a27e75f925000475fd103a924466a55426e1ea314870df500
SHA5128c8fab2114e5d05d3d5c85558e4e7480fb93e210bc1dadc001131c2292034083f7920721396ffeedba65cdb0dcde0faee2b36f05e2e46b06749564dd5c398a83
-
memory/320-197-0x0000000004F70000-0x0000000005002000-memory.dmpFilesize
584KB
-
memory/320-203-0x0000000005100000-0x000000000510A000-memory.dmpFilesize
40KB
-
memory/320-209-0x0000000004F00000-0x0000000004F10000-memory.dmpFilesize
64KB
-
memory/320-196-0x0000000005480000-0x0000000005A24000-memory.dmpFilesize
5.6MB
-
memory/320-211-0x0000000004F00000-0x0000000004F10000-memory.dmpFilesize
64KB
-
memory/320-212-0x0000000004F00000-0x0000000004F10000-memory.dmpFilesize
64KB
-
memory/320-213-0x0000000004F00000-0x0000000004F10000-memory.dmpFilesize
64KB
-
memory/320-191-0x0000000000740000-0x0000000000A9C000-memory.dmpFilesize
3.4MB
-
memory/636-223-0x00007FF76A250000-0x00007FF76A76F000-memory.dmpFilesize
5.1MB
-
memory/636-222-0x00007FF76A250000-0x00007FF76A76F000-memory.dmpFilesize
5.1MB
-
memory/636-225-0x00007FF76A250000-0x00007FF76A76F000-memory.dmpFilesize
5.1MB
-
memory/636-226-0x00007FF76A250000-0x00007FF76A76F000-memory.dmpFilesize
5.1MB
-
memory/1248-228-0x00007FF76A250000-0x00007FF76A76F000-memory.dmpFilesize
5.1MB
-
memory/1248-229-0x00007FF76A250000-0x00007FF76A76F000-memory.dmpFilesize
5.1MB
-
memory/1248-230-0x00007FF76A250000-0x00007FF76A76F000-memory.dmpFilesize
5.1MB
-
memory/1248-231-0x00007FF76A250000-0x00007FF76A76F000-memory.dmpFilesize
5.1MB
-
memory/1248-232-0x00007FF76A250000-0x00007FF76A76F000-memory.dmpFilesize
5.1MB
-
memory/3236-133-0x0000000000400000-0x000000000091F000-memory.dmpFilesize
5.1MB
-
memory/3236-179-0x0000000061E00000-0x0000000061EF1000-memory.dmpFilesize
964KB
-
memory/3940-210-0x0000000000F50000-0x0000000001DA0000-memory.dmpFilesize
14.3MB